Him, an adventurer, CISO, soldier, Marine, law officer, author, professor, spy, yachty, motorcyclist, photographer. Her, was the church lady librarian, got divorced, joined a motorcycle gang, became a hacker, and world adventurer.

For courses on Wednesday 2/5 I will NOT be having class. All courses on Purdue campus are cancelled at this point until 1PM. I will NOT be holding office hours today. We will reschedule the laboratory for today. Do the…

I get asked because I have a degree what I know. I get challenged because I have an advanced degree if it is worthwhile. The first question is an assumption of inventory. The second is a biased question with a…

Course Description: Consumer technologies are rapidly moving forward with items integrating processing, storage, and transmission into their base functionality. The enterprise issues with bring your own device has rapidly expanded requirements on forensics investigators to address a plethora of mobile…

Course Description: This course will examine the spectrum of conflict from crime through cyber warfare. Specific case studies of transnational cyber crime and organizations engaged in such activities along with cyber conflict at the nation state level will be detailed…

You can click HERE for an interactive report from WordPress. Basics! About 45K visitors up from 39K in 2012 121 Posts in 2013 up from 77 in 2012 #1 Visited Post 2013 Iron Butt Rally Sunset Top referring sites Twitter…

Friends, family, and colleagues; The Liles family has had a wonderfully blessed year. We are a lucky family now living in West Lafayette, Indiana. The year has been filled with some challenges, some tribulations, lots of laughter, a few tears,…

I would like to congratulate four CIT graduate students in their win of the Defense Cyber Crime Center (DC3) cyber forensics challenge. Team “Or11–” came together and was composed of these four students. William Ellis Jacob Kambic Eric Katz Sydney…

I teach a discipline almost completely on topics of interest only to government entities. By far and in most cases the only people interested in investing towards professional incident response requiring forensics level skills is the government. Whether a local…

RSS Links

Cyber?

Cyber security and the technologies of securing the information enterprise of industry and government require a trans-disciplinary while still STEM focused research agenda. The term “cyber” itself denotes a human cognitive centric concept that deals with the disintermediation of technology centered within human activity. The changing focus from system threat mitigation to enterprise risk management has opened completely new areas of inquiry into security.